Computer Forensic & Intrusion Analyst
Employment Type : Full-Time
Position Description: Bridges is expanding, and we are seeking a Computer Forensic & Intrusion Analyst to perform in-depth forensics examinations of computers and other electronic devices to detect the presence of unknown malware in both hardware and software. The investigator will use a variety of digital forensics tools to conduct forensic examination activities including assisting in the analysis of network, computer and other devices.
The Computer Forensic & Intrusion Analyst Skill Level 2 shall possess the following capabilities:
- Conducting intrusion analysis
- Manage complex large data set analysis
- Perform in-depth email analysis
- Perform in-depth registry analysis
- Conduct in-depth encryption detection and analysis
- Preparing documentation and technical reports
About Bridges Inc.: Why Join Bridges?- We have a small company feel with big company opportunities.
- We solve the Nation’s most difficult intelligence challenges by delivering trusted cyber security and shaping big data into confident decisions.
- In today’s cyber battleground, our team of elite experts makes Bridges an industry pacesetter and agile innovator that delivers success as a trusted partner.
- Our employees are like family. We focus on maintaining our culture and values of commitment, integrity, respect, and courage.
- We take care of our family with benefits and compensation packages worth bragging about.
- We believe in developing our people, so we pay for your certifications in addition to an annual training stipend. We have a training initiative for ongoing Azure and AWS certifications, and we develop individual, custom training plans.
- Most important, we have fun!
Qualifications:Required Qualifications:- ***Active TS/SCI with Polygraph Clearance***
- Extensive experience (5+ years) in Defensive Cyber Operations (DCO) and/or information security operations and in the security aspects of multiple platforms, operating systems, software, communications, and network protocols along with malware analysis in support of incident analysis and response.
- Bachelor's Degree in Computer Science, Digital Forensics or other information technology discipline.
CERTIFICATIONS: (required) CompTIA Security+
One or more required within six (6) months of hire:- Certified Penetration Testing Engineer (CPTE)
- Certified Ethical Hacker (CEH)
- GIAC Security Essentials Certification (GSEC) CISSP
- GIAC Certified Intrusion Analyst (GCIA)
One or more required within one (1) year of hire:- GIAC Certified Forensic Examiner (GCFE)
- GIAC Certified Forensic Analyst (GCFA/better than -GCFE)
- GIAC Reverse Engineering Malware (GREM)
- Encase
- SANS Institute Forensic Toolkit (SIFT)
- Forensic Tool Kit (FTK) vendor certifications and product experience